Additional Resources / Questions
Last updated
Was this helpful?
Last updated
Was this helpful?
Learning Frida is all about finding stuff online!
We could not possibly cover all there is to know in the span of 90 minutes. Instead, our goal is to empower you and provide concrete examples of situations where as a forensic examiner, you might consider RE to help explain or validate some tricky data.
We recommend following on Twitter as you will be more likely to see when new versions are released.
The release notes often provide working examples you may be able to use in your own reverse engineering.
It might seem obvious, but it's worth reiterating -- one of the best resources out there is the Frida website itself. For instance, check out this page on the or this page with a bunch of .
On June 9th, we hosted a followup Q&A and discussed a number of other interesting resources which are listed below.
Azeria labs
OWASP Mobile Security Testing Guide
CrackMes RE test apps
Flare-VM
Daily CTF Challenge from NW3C
iOS RE Repo
Exploit Writing Tutorial
Another great way to get in touch with a room full of reverse engineering folks is to .
This lab is all about Android, but in the event you wanted to try your hand at frida on iOS, you can do that! Checkm8/checkra1n has really made this a lot more accessible than it used to be.
There are definitely nuances that make it distinct than Android. Generally speaking, static analysis can also be more tricky!
Maddie Stone has an which focuses on reversing potentially malicious applications.
One great way to get started is with Ivan Rodriguez's available for those interested in pursuing iOS RE.